default search action
ACM Transactions on Sensor Networks (TOSN), Volume 7
Volume 7, Number 1, August 2010
- Branislav Kusy, Isaac Amundson, János Sallai, Péter Völgyesi, Ákos Lédeczi, Xenofon D. Koutsoukos:
RF doppler shift-based mobile sensor tracking and navigation. 1:1-1:32 - Jun Zhang, Xiaohua Jia, Guoliang Xing:
Real-time data aggregation in contention-based wireless sensor networks. 2:1-2:25 - YoungMin Kwon, Kirill Mechitov, Sameer Sundresh, WooYoung Kim, Gul Agha:
Resilient localization for sensor networks in outdoor environments. 3:1-3:30 - Ryo Sugihara, Rajesh K. Gupta:
Speed control and scheduling of data mules in sensor networks. 4:1-4:29 - Wen Hu, Hailun Tan, Peter Corke, Wen Chan Shih, Sanjay Jha:
Toward trusted wireless sensor networks. 5:1-5:25 - Christopher Miller, Christian Poellabauer:
Reliable and efficient reprogramming in sensor networks. 6:1-6:32 - Jun Bum Lim, Beakcheol Jang, Suyoung Yoon, Mihail L. Sichitiu, Alexander G. Dean:
RaPTEX: Rapid prototyping tool for embedded communication systems. 7:1-7:40 - Chao Wang, Parameswaran Ramanathan, Kewal K. Saluja:
Modeling latency - lifetime trade-off for target detection in mobile sensor networks. 8:1-8:24 - Konstantinos Kalpakis:
Everywhere sparse approximately optimal minimum energy data gathering and aggregation in sensor networks. 9:1-9:26 - Koen Langendoen, Andreas Meier:
Analyzing MAC protocols for low data-rate applications. 10:1-10:34
Volume 7, Number 2, August 2010
- Keith M. Martin, Maura B. Paterson, Douglas R. Stinson:
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes. 11:1-11:27 - Periklis Liaskovitis, Curt Schurgers:
Leveraging redundancy in sampling-interpolation applications for sensor networks: A spectral approach. 12:1-12:28 - Renita Machado, Wensheng Zhang, Guiling Wang, Sirin Tekinay:
Coverage properties of clustered wireless sensor networks. 13:1-13:21 - Petr Jurcík, Anis Koubaa, Ricardo Severino, Mário Alves, Eduardo Tovar:
Dimensioning and worst-case analysis of cluster-tree sensor networks. 14:1-14:47 - Luca Mottola, Gian Pietro Picco, Matteo Ceriotti, Stefan Guna, Amy L. Murphy:
Not all wireless sensor networks are created equal: A comparative study on tunnels. 15:1-15:33 - Mario Strasser, Boris Danev, Srdjan Capkun:
Detection of reactive jamming in sensor networks. 16:1-16:29 - Ioannis Ch. Paschalidis, Yin Chen:
Statistical anomaly detection with sensor networks. 17:1-17:23 - David K. Y. Yau, Nung Kwan Yip, Chris Y. T. Ma, Nageswara S. V. Rao, Mallikarjun Shankar:
Quality of monitoring of stochastic events by periodic and proportional-share scheduling of sensor coverage. 18:1-18:49 - Koen Langendoen, Andreas Meier:
Analyzing MAC protocols for low data-rate applications. 19:1-19:40
Volume 7, Number 3, September 2010
- Jeongyeup Paek, Ramesh Govindan:
RCRT: Rate-controlled reliable transport protocol for wireless sensor networks. 20:1-20:45 - Jren-Chit Chin, Nageswara S. V. Rao, David K. Y. Yau, Mallikarjun Shankar, Yong Yang, Jennifer C. Hou, Srinivasagopalan Srivathsan, S. Sitharama Iyengar:
Identification of low-level point radioactive sources using a sensor network. 21:1-21:35 - Rong Zheng, Khuong Vu, Amit Pendharkar, Gangbing Song:
Obstacle discovery in distributed actuator and sensor networks. 22:1-22:24 - Hristo N. Djidjev:
Approximation algorithms for computing minimum exposure paths in a sensor field. 23:1-23:25 - Thomas Schmid, Roy Shea, Zainul Charbiwala, Jonathan Friedman, Mani B. Srivastava, Young H. Cho:
On the interaction of clocks, power, and synchronization in duty-cycled embedded sensor nodes. 24:1-24:19 - David Peleg, Liam Roditty:
Localized spanner construction for ad hoc networks with variable transmission range. 25:1-25:14 - Yibei Ling, Chung-Min Chen, Shigang Chen:
Analysis of power-aware buffering schemes in wireless sensor networks. 26:1-26:33 - Alon Efrat, David Forrester, Anand Iyer, Stephen G. Kobourov, Cesim Erten, Ozan Kilic:
Force-directed approaches to sensor localization. 27:1-27:25
Volume 7, Number 4, February 2011
- Matthew Holland, Tianqi Wang, Bülent Tavli, Alireza Seyedi, Wendi Beth Heinzelman:
Optimizing physical-layer parameters for wireless sensor networks. 28:1-28:20 - Aldar C.-F. Chan, Claude Castelluccia:
A security framework for privacy-preserving data aggregation in wireless sensor networks. 29:1-29:45 - Rajesh Krishna Panta, Saurabh Bagchi, Samuel P. Midkiff:
Efficient incremental code update for sensor networks. 30:1-30:32 - Andreas Krause, Carlos Guestrin, Anupam Gupta, Jon M. Kleinberg:
Robust sensor placements at informative and communication-efficient locations. 31:1-31:33 - Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbell:
Energy-efficient congestion detection and avoidance in sensor networks. 32:1-32:31 - Guiling Wang, Mary Jane Irwin, Haoying Fu, Piotr Berman, Wensheng Zhang, Tom La Porta:
Optimizing sensor movement planning for energy efficiency. 33:1-33:17 - Holger Paul Keeler, Peter G. Taylor:
A model framework for greedy routing in a sensor network with a stochastic power scheme. 34:1-34:28 - Haiyan Cai, Xiaohua Jia, Mo Sha:
Critical sensor density for partial connectivity in large area wireless sensor networks. 35:1-35:23 - Yuanchen Zhu, Steven J. Gortler, Dylan Thurston:
Sensor network localization using sensor perturbation. 36:1-36:23
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.